If you are a Small Business customer, find additional troubleshooting and learning resources at the Support for Small Business site.

Microsoft has released a Microsoft security advisory about this issue for IT professionals. The security advisory contains additional security-related information. To view the security advisory, visit the following Microsoft Web site:

This fixit solution described in this section is not intended to be a replacement for any security update. We recommend that you always install the latest security updates. However, we offer this fixit solution as a workaround option for some scenarios.

For more information about this workaround, visit the following Microsoft Security Advisory Web page:

The advisory provides more information about the issue, including the following:

The scenarios in which you might apply or disable the workaround.

How to manually apply the workaround.

Specifically, to see this information, look for the General Information heading, then expand the Suggested actions section, and then expand the Workaround section.

To automatically apply this resolution, click the Fix this problem link under the "Enable Network Protocol Lockdown" heading. Then, click Run in the File Download dialog box and follow the steps in the wizard. This applies the "enable network protocol lockdown" workaround that is listed in CVE-2010-0255.

To automatically undo the fix and restore the original settings, click the Fix this problem link under the "Disable Network Protocol Lockdown" heading. Then, click Run in the File Download dialog box and follow the steps in the wizard. This removes the "enable network protocol lockdown" workaround that is listed in CVE-2010-0255.

Microsoft has tested the following workarounds. Although these workarounds will not correct the underlying vulnerability, they help block known attack vectors. For more information about the workarounds, see the security advisory